Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using artificial neural networks to detect unknown computer worms., , , , and . Neural Comput. Appl., 18 (7): 663-674 (2009)X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail., , , , , , and . CoRR, (2023)Efficient Multidimensional Suppression for K-Anonymity., , , and . IEEE Trans. Knowl. Data Eng., 22 (3): 334-347 (2010)The Security of Deep Learning Defences for Medical Imaging., , , and . CoRR, (2022)Evaluating the Security of Satellite Systems., , , , and . CoRR, (2023)Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity., , , , and . CoRR, (2020)IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response., , , , , , and . CoRR, (2023)TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack., , , , and . CoRR, (2021)DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms in Vision Transformers., , , , and . CoRR, (2024)Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices., , , , , , , , and . CoRR, (2018)